{"id":10705,"date":"2024-04-15T10:21:12","date_gmt":"2024-04-15T08:21:12","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=10705"},"modified":"2024-05-16T13:10:44","modified_gmt":"2024-05-16T11:10:44","slug":"sap-security-notes-march-2024","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/","title":{"rendered":"SAP Security Notes, March 2024"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>March 2024 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches was 12, which is 4 less than last month. The number of Hot News notes was 3, which is 1 more than the previous month. It is also worth mentioning that the number of high criticality notes has decreased compared to last month: 3 this month. As always, we will leave the medium and low severity notes unreviewed, but <strong>we will detail a total of 6 notes<\/strong> (all those with a CVSS of 7 or higher).<\/p>\n<p>We have <strong>a total of 12 notes<\/strong> for the entire month (the 12 from Patch Tuesday, 10 new and 2 updates, which are 4 notes less than the last Patch Tuesday).<\/p>\n<p>We will review in detail a total of 6 notes, the 3 HotNews of this month: 2 new and 1 update, and the 3 high severity notes: 2 of them new and 1 update (those with a CVSS equal to or greater than 7).<\/p>\n<ol>\n<li><strong>The most critical note of the month (with a CVSS of <span style=\"color: #ff0000;\">10<\/span>)<\/strong> is an update to a usual HotNews related to &#8220;<strong>Google Chromium<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with a <strong>CVSS of <span style=\"color: #ff0000;\">9.4<\/span><\/strong>) is a HotNews related to &#8220;<strong>Code Injection vulnerability in applications built with SAP Build Apps<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with a <strong>CVSS of <span style=\"color: #ff0000;\">9.1<\/span><\/strong>) is a HotNews related to &#8220;<strong>Code Injection vulnerability in SAP NetWeaver AS Java<\/strong>&#8220;.<\/li>\n<li>The next in criticality (with a <strong>CVSS of <span style=\"color: #ff0000;\">8.8<\/span><\/strong>) is an update of a note related to &#8220;<strong>Improper authentication in SAP Commerce Cloud<\/strong>&#8220;.<\/li>\n<li>The next in criticality (<strong>with CVSS of <span style=\"color: #d1d100;\">7,5<\/span><\/strong><strong><span style=\"color: #d1d100;\">\u00a0<\/span><\/strong><strong>and <\/strong><span style=\"color: #d1d100;\"><strong>7,2<\/strong><\/span><strong><span style=\"color: #d1d100;\">\u00a0<\/span><\/strong><strong>, respectively<\/strong>) are related to &#8220;<strong>Denial of service (DOS) in SAP HANA XS Classic and HANA XS Advanced<\/strong>&#8221; and &#8220;<strong>Path Traversal Vulnerability in SAP BusinessObjects Business Intelligence Platform (Central Management Console)<\/strong>&#8220;.<\/li>\n<li>This month, the most predominant type is related to &#8220;<strong>Information Disclosure vulnerability<\/strong>&#8221; (3\/12 on patch day).<\/li>\n<\/ol>\n<p>In the graph, we can see the <span style=\"text-decoration: underline;\"><strong>classification of the March notes<\/strong><\/span>, as well as the evolution and classification of the last 5 months (only the notes from Sec. Tuesday \/ Patch Day \u2013 by SAP):<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-10707\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg\" alt=\"\" width=\"801\" height=\"421\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024-600x315.jpg 600w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol>\n<li>\u00a0<strong><u>Update -Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660)<\/u><\/strong><strong>:<\/strong>\u00a0This security note addresses multiple vulnerabilities in the 3rd party web browser control\u00a0Chromium, which can be used\u00a0within\u00a0SAP\u00a0Business\u00a0Client. This note will be modified periodically based on web browser updates by the open-source project\u00a0Chromium. The note priority is based on the highest CVSS score of all the vulnerabilities fixed in the latest browser release. If the\u00a0SAP\u00a0Business\u00a0Client\u00a0release is not updated to the latest patch level, displaying web pages in\u00a0SAP\u00a0Business\u00a0Client\u00a0via this open-source browser control might lead to different vulnerabilities like memory corruption, Information Disclosure and the like. The solution will be to update the\u00a0SAP\u00a0Business\u00a0Client\u00a0patch to the newest one, which contains the most current stable major release of the\u00a0Chromium\u00a0browser control, which passed the\u00a0SAP\u00a0internal quality measurements of\u00a0SAP\u00a0Business\u00a0Client. The note has been re-released\u00a0with\u00a0updated \u2018Solution\u2019 and \u2018Support Packages &amp; Patches\u2019 information. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>10<\/strong><\/span><strong><span style=\"color: #ff0000;\">\u00a0<\/span>\/ 10 (Multiple CVE\u00b4s).<\/strong><\/li>\n<li>\u00a0<strong><u>Code Injection vulnerability in applications built with SAP Build Apps\u00a0(3425274<\/u><\/strong>): SAP Build Apps applications have a code injection vulnerability, allowing attackers to execute unauthorized commands. This can affect the confidentiality (low impact) and the integrity and availability (high impact) of the application. The solution is to rebuild the application in SAP Build Apps with version 4.9.145 or later. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,4 <\/strong><\/span><strong>\/ 10 [CVE-2019-10744].<\/strong><\/li>\n<li>\u00a0<strong><u>Code Injection vulnerability in SAP NetWeaver AS Java (Administrator Log Viewer plug-in)\u00a0(3433192<\/u><\/strong><strong>)<\/strong>: The SAP NetWeaver Administrator AS Java Log Viewer add-on has a vulnerability that allows an attacker with elevated privileges to load potentially dangerous files, which can result in a command injection, leading to data compromise and impacting system availability. The solution involves restricting the types of files that can be uploaded after applying the Note. It is recommended to scan each file for threats and upgrade NW Application Server Java to a version or SP that addresses this issue.<strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,1<\/strong><\/span><strong><span style=\"color: #ff0000;\">\u00a0<\/span>\/ 10 [CVE-2024-22127].<\/strong><\/li>\n<li>\u00a0<strong><u>Update &#8211; Improper authentication in SAP Commerce Cloud (3346500<\/u><\/strong><strong>)<\/strong>: Certain configurations of SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase. This vulnerability only affects active user accounts that have an empty passphrase. Other user accounts that have a valid passphrase set are not affected. Note contains a workaround.<strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,8<\/strong><\/span><strong><span style=\"color: #ff0000;\">\u00a0<\/span>\/ 10 [CVE-2023-39439].<\/strong><\/li>\n<li>\u00a0<strong><u>Denial of service (DOS) in SAP HANA XS Classic and HANA XS Advanced (3410615<\/u><\/strong>): SAP HANA XS Classic and HANA XS Advanced are vulnerable to a denial of service (DOS) attack through a flood of HTTP\/2 requests by an unauthenticated user. This attack can cause a significant impact on application availability, without affecting the confidentiality or integrity of the application. The solution for SAP HANA Database 2.0 is to implement revision 2.00.59.12 or newer, while for SAP HANA Extended Application Services Advanced (XS Advanced), it is recommended to implement version 1.1.8 or newer. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #d1d100;\"><strong>7,5 <\/strong><\/span><strong>\/ 10 [CVE-2023-44487].<\/strong><\/li>\n<li>\u00a0<strong><u>Code Injection vulnerability in SAP IDES Systems (3414195):<\/u><\/strong>SAP BusinessObjects Business Intelligence Platform CMC employs a vulnerable version of Apache Struts, susceptible to CVE-2023-50164. A user with elevated privileges could exploit this vulnerability, causing a high impact on the confidentiality, integrity and availability of the application. The solution involves upgrading the affected open-source library to a non-vulnerable version.<strong>\u00a0CVSS v3 Base Score: <\/strong><span style=\"color: #d1d100;\"><strong>7,2<\/strong><\/span><strong><span style=\"color: #d1d100;\">\u00a0<\/span>\/ 10 [CVE-2023-50164].<\/strong><\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (March):<\/p>\n<p><a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/march-2024.html\">Digital Library (sap.com)<\/a><\/p>\n<p><a href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-march-2024\/\">SAP Patch Day: March 2024 &#8211; Onapsis<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>SAP Business Client, Versions &#8211; 6.5, 7.0, 7.70<\/li>\n<li>SAP Build Apps, Versions &lt; 4.9.145<\/li>\n<li>SAP NetWeaver AS Java (Administrator Log Viewer plug-in), Version &#8211; 7.50<\/li>\n<li>SAP Commerce, Versions \u2013 HY_COM 2105, HY_COM 2205, COM_CLOUD 2211<\/li>\n<li>SAP HANA Database, Version \u2013 2.0<\/li>\n<li>SAP HANA Extended Application Services Advanced (XS Advanced), Version \u2013 1.0<\/li>\n<li>SAP BusinessObjects Business Intelligence Platform (Central Management Console), Versions &#8211; 4.3<\/li>\n<li>SAP NetWeaver AS ABAP applications based on SAPGUI for HTML (WebGUI), Versions \u2013 7.89, 7.93<\/li>\n<li>NetWeaver (WSRM), Versions \u2013 7.50<\/li>\n<li>SAP NetWeaver (Enterprise Portal), Version \u2013 7.50<\/li>\n<li>SAP NetWeaver Process Integration (Support Web Pages), Versions \u2013 7.50<\/li>\n<li>SAP Fiori Front End Server, Version \u2013 605<\/li>\n<li>SAP ABAP Platform, Versions \u2013 758, 795<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. March 2024 notes Summary and highlights of the month The total number of notes\/patches was 12, which is 4 less than last month. The number of Hot News notes was 3, which is&#8230;<\/p>\n","protected":false},"author":6,"featured_media":10707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-10705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, March 2024 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, March 2024\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T08:21:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T11:10:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, March 2024\",\"datePublished\":\"2024-04-15T08:21:12+00:00\",\"dateModified\":\"2024-05-16T11:10:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/\"},\"wordCount\":1033,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/notas-sap-marzo-2024.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/\",\"name\":\"SAP Security Notes, March 2024 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/notas-sap-marzo-2024.jpg\",\"datePublished\":\"2024-04-15T08:21:12+00:00\",\"dateModified\":\"2024-05-16T11:10:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/notas-sap-marzo-2024.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/notas-sap-marzo-2024.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-march-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, March 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, March 2024 - Inprosec","description":"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, March 2024","og_description":"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/","og_site_name":"Inprosec","article_published_time":"2024-04-15T08:21:12+00:00","article_modified_time":"2024-05-16T11:10:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, March 2024","datePublished":"2024-04-15T08:21:12+00:00","dateModified":"2024-05-16T11:10:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/"},"wordCount":1033,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/","name":"SAP Security Notes, March 2024 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg","datePublished":"2024-04-15T08:21:12+00:00","dateModified":"2024-05-16T11:10:44+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from March 2024, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/03\/notas-sap-marzo-2024.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-march-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, March 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=10705"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10705\/revisions"}],"predecessor-version":[{"id":10711,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/10705\/revisions\/10711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/10707"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=10705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=10705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=10705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}